Description

All product names, logos, and brands are property of their respective owners. All company, product and service names used in this website are for identification purposes only. Use of these names, logos, and brands does not imply endorsement.If you are an owner of some content and want it to be removed, please mail to content@vulners.com Vulners, 2018

{"openvas": [{"lastseen": "2019-05-29T18:35:17", "bulletinFamily": "scanner", "description": "The host is installed with HP System\n Management Homepage (SMH) and is prone to multiple vulnerabilities.", "modified": "2018-11-21T00:00:00", "published": "2016-03-22T00:00:00", "id": "OPENVAS:1361412562310807526", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310807526", "title": "HP System Management Homepage Multiple Vulnerabilities(mar-2016)", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_hp_smh_mult_vuln_mar16.nasl 12455 2018-11-21 09:17:27Z cfischer $\n#\n# HP System Management Homepage Multiple Vulnerabilities(mar-2016)\n#\n# Authors:\n# Rinu Kuriakose <krinu@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2016 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:hp:system_management_homepage\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.807526\");\n script_version(\"$Revision: 12455 $\");\n script_cve_id(\"CVE-2016-1993\", \"CVE-2016-1994\", \"CVE-2016-1995\", \"CVE-2016-1996\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-11-21 10:17:27 +0100 (Wed, 21 Nov 2018) $\");\n script_tag(name:\"creation_date\", value:\"2016-03-22 12:10:54 +0530 (Tue, 22 Mar 2016)\");\n script_tag(name:\"qod_type\", value:\"remote_banner\");\n script_name(\"HP System Management Homepage Multiple Vulnerabilities(mar-2016)\");\n\n script_tag(name:\"summary\", value:\"The host is installed with HP System\n Management Homepage (SMH) and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The multiple flaws are due to multiple\n unspecified errors.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow attackers\n to obtain and modify sensitive information and also remote attackers to execute\n arbitrary code and to obtain sensitive information.\");\n\n script_tag(name:\"affected\", value:\"HP System Management Homepage before 7.5.4\");\n\n script_tag(name:\"solution\", value:\"Upgrade to HP System Management Homepage\n 7.5.4 or later.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_xref(name:\"URL\", value:\"http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05045763\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2016 Greenbone Networks GmbH\");\n script_family(\"Web application abuses\");\n script_dependencies(\"secpod_hp_smh_detect.nasl\");\n script_mandatory_keys(\"HP/SMH/installed\");\n script_require_ports(\"Services/www\", 2301, 2381);\n script_xref(name:\"URL\", value:\"http://www8.hp.com/us/en/products/server-software/product-detail.html?oid=344313\");\n exit(0);\n}\n\ninclude(\"version_func.inc\");\ninclude(\"host_details.inc\");\n\nif(!smhPort = get_app_port(cpe:CPE)){\n exit(0);\n}\n\nif(!smhVer = get_app_version(cpe:CPE, port:smhPort)){\n exit(0);\n}\n\nif(version_is_less(version:smhVer, test_version:\"7.5.4\"))\n{\n report = report_fixed_ver(installed_version:smhVer, fixed_version:\"7.5.4\");\n security_message(data:report, port:smhPort);\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "nessus": [{"lastseen": "2019-02-21T01:26:33", "bulletinFamily": "scanner", "description": "According to the web server's banner, the version of HP System Management Homepage (SMH) hosted on the remote web server is a version prior to 7.5.4. It is, therefore, affected by the following vulnerabilities :\n\n - A denial of service vulnerability exists when processing an ECParameters structure due to an infinite loop that occurs when a specified curve is over a malformed binary polynomial field. A remote attacker can exploit this to perform a denial of service against any system that processes public keys, certificate requests, or certificates. This includes TLS clients and TLS servers with client authentication enabled. (CVE-2015-1788) \n\n - A denial of service vulnerability exists due to improper validation of the content and length of the ASN1_TIME string by the X509_cmp_time() function. A remote attacker can exploit this, via a malformed certificate and CRLs of various sizes, to cause a segmentation fault, resulting in a denial of service condition. TLS clients that verify CRLs are affected. TLS clients and servers with client authentication enabled may be affected if they use custom verification callbacks.\n (CVE-2015-1789)\n\n - A NULL pointer dereference flaw exists in the PKCS#7 parsing code due to incorrect handling of missing inner 'EncryptedContent'. This allows a remote attacker, via specially crafted ASN.1-encoded PKCS#7 blobs with missing content, to cause a denial of service condition or other potential unspecified impacts. (CVE-2015-1790)\n\n - A double-free error exists due to a race condition that occurs when a NewSessionTicket is received by a multi-threaded client when attempting to reuse a previous ticket. (CVE-2015-1791)\n\n - A denial of service vulnerability exists in the CMS code due to an infinite loop that occurs when verifying a signedData message. A remote attacker can exploit this to cause a denial of service condition. (CVE-2015-1792)\n\n - A certificate validation bypass vulnerability exists in the Security:Encryption subcomponent due to a flaw in the X509_verify_cert() function in x509_vfy.c that is triggered when locating alternate certificate chains when the first attempt to build such a chain fails. A remote attacker can exploit this, by using a valid leaf certificate as a certificate authority (CA), to issue invalid certificates that will bypass authentication.\n (CVE-2015-1793)\n\n - A cross-request authentication bypass vulnerability exists in libcurl due to the use of an existing, authenticated connection when performing a subsequent unauthenticated NTLM HTTP request. An attacker can exploit this to bypass authentication mechanisms.\n (CVE-2015-3143)\n\n - A denial of service vulnerability exists in libcurl due to a flaw in the sanitize_cookie_path() function that is triggered when handling a cookie path element that consists of a single double-quote. An attacker can exploit this to cause the application to crash.\n (CVE-2015-3145)\n\n - A cross-request authentication bypass vulnerability exists in libcurl due to a flaw that is triggered when a request is 'Negotiate' authenticated, which can cause the program to treat the entire connection as authenticated rather than just that specific request. An attacker can exploit this to bypass authentication mechanisms for subsequent requests. (CVE-2015-3148)\n\n - A man-in-the-middle vulnerability, known as Logjam, exists due to a flaw in the SSL/TLS protocol. A remote attacker can exploit this flaw to downgrade connections using ephemeral Diffie-Hellman key exchange to 512-bit export-grade cryptography. (CVE-2015-4000)\n\n - A flaw exists in the multipart_buffer_headers() function in rfc1867.c due to improper handling of multipart/form-data in HTTP requests. A remote attacker can exploit this flaw to cause a consumption of CPU resources, resulting in a denial of service condition.\n (CVE-2015-4024)\n\n - An unspecified flaw exists that allows an authenticated, remote attacker to impact confidentiality and integrity.\n (CVE-2016-1993)\n\n - An unspecified information disclosure vulnerability exists that allows an authenticated, remote attacker to gain unauthorized access to information. (CVE-2016-1994)\n\n - An unspecified remote code execution vulnerability exists that allows an unauthenticated, remote attacker to take complete control of the system. (CVE-2016-1995)\n\n - An unspecified flaw exists that allows a local attacker to impact confidentiality and integrity. (CVE-2016-1996)", "modified": "2018-11-15T00:00:00", "id": "HPSMH_7_5_4.NASL", "href": "https://www.tenable.com/plugins/index.php?view=single&id=90150", "published": "2016-03-24T00:00:00", "title": "HP System Management Homepage < 7.5.4 Multiple Vulnerabilities (Logjam)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(90150);\n script_version(\"1.7\");\n script_cvs_date(\"Date: 2018/11/15 20:50:25\");\n\n script_cve_id(\n \"CVE-2015-1788\",\n \"CVE-2015-1789\",\n \"CVE-2015-1790\",\n \"CVE-2015-1791\",\n \"CVE-2015-1792\",\n \"CVE-2015-1793\",\n \"CVE-2015-3143\",\n \"CVE-2015-3145\",\n \"CVE-2015-3148\",\n \"CVE-2015-4000\",\n \"CVE-2015-4024\",\n \"CVE-2016-1993\",\n \"CVE-2016-1994\",\n \"CVE-2016-1995\",\n \"CVE-2016-1996\"\n );\n script_bugtraq_id(\n 74299,\n 74301,\n 74303,\n 74733,\n 74903,\n 75154,\n 75156,\n 75157,\n 75158,\n 75161,\n 75652\n );\n script_xref(name:\"HP\", value:\"HPSBMU03546\");\n script_xref(name:\"HP\", value:\"emr_na-c05045763\");\n script_xref(name:\"HP\", value:\"SSRT101447\");\n script_xref(name:\"HP\", value:\"SSRT101858\");\n script_xref(name:\"HP\", value:\"SSRT102109\");\n script_xref(name:\"HP\", value:\"SSRT102164\");\n script_xref(name:\"HP\", value:\"PSRT110050\");\n\n script_name(english:\"HP System Management Homepage < 7.5.4 Multiple Vulnerabilities (Logjam)\");\n script_summary(english:\"Checks the banner.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote web server is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to the web server's banner, the version of HP System\nManagement Homepage (SMH) hosted on the remote web server is a version\nprior to 7.5.4. It is, therefore, affected by the following\nvulnerabilities :\n\n - A denial of service vulnerability exists when processing\n an ECParameters structure due to an infinite loop that\n occurs when a specified curve is over a malformed binary\n polynomial field. A remote attacker can exploit this to\n perform a denial of service against any system that\n processes public keys, certificate requests, or\n certificates. This includes TLS clients and TLS servers\n with client authentication enabled. (CVE-2015-1788) \n\n - A denial of service vulnerability exists due to improper\n validation of the content and length of the ASN1_TIME\n string by the X509_cmp_time() function. A remote\n attacker can exploit this, via a malformed certificate\n and CRLs of various sizes, to cause a segmentation\n fault, resulting in a denial of service condition. TLS\n clients that verify CRLs are affected. TLS clients and\n servers with client authentication enabled may be\n affected if they use custom verification callbacks.\n (CVE-2015-1789)\n\n - A NULL pointer dereference flaw exists in the PKCS#7\n parsing code due to incorrect handling of missing inner\n 'EncryptedContent'. This allows a remote attacker, via\n specially crafted ASN.1-encoded PKCS#7 blobs with\n missing content, to cause a denial of service condition\n or other potential unspecified impacts. (CVE-2015-1790)\n\n - A double-free error exists due to a race condition that\n occurs when a NewSessionTicket is received by a\n multi-threaded client when attempting to reuse a\n previous ticket. (CVE-2015-1791)\n\n - A denial of service vulnerability exists in the CMS code\n due to an infinite loop that occurs when verifying a\n signedData message. A remote attacker can exploit this\n to cause a denial of service condition. (CVE-2015-1792)\n\n - A certificate validation bypass vulnerability exists in\n the Security:Encryption subcomponent due to a flaw in\n the X509_verify_cert() function in x509_vfy.c that is\n triggered when locating alternate certificate chains\n when the first attempt to build such a chain fails. A\n remote attacker can exploit this, by using a valid leaf\n certificate as a certificate authority (CA), to issue\n invalid certificates that will bypass authentication.\n (CVE-2015-1793)\n\n - A cross-request authentication bypass vulnerability\n exists in libcurl due to the use of an existing,\n authenticated connection when performing a subsequent\n unauthenticated NTLM HTTP request. An attacker can\n exploit this to bypass authentication mechanisms.\n (CVE-2015-3143)\n\n - A denial of service vulnerability exists in libcurl due\n to a flaw in the sanitize_cookie_path() function that is\n triggered when handling a cookie path element that\n consists of a single double-quote. An attacker can\n exploit this to cause the application to crash.\n (CVE-2015-3145)\n\n - A cross-request authentication bypass vulnerability\n exists in libcurl due to a flaw that is triggered when a\n request is 'Negotiate' authenticated, which can cause\n the program to treat the entire connection as\n authenticated rather than just that specific request. An\n attacker can exploit this to bypass authentication\n mechanisms for subsequent requests. (CVE-2015-3148)\n\n - A man-in-the-middle vulnerability, known as Logjam,\n exists due to a flaw in the SSL/TLS protocol. A remote\n attacker can exploit this flaw to downgrade connections\n using ephemeral Diffie-Hellman key exchange to 512-bit\n export-grade cryptography. (CVE-2015-4000)\n\n - A flaw exists in the multipart_buffer_headers() function\n in rfc1867.c due to improper handling of\n multipart/form-data in HTTP requests. A remote attacker\n can exploit this flaw to cause a consumption of CPU\n resources, resulting in a denial of service condition.\n (CVE-2015-4024)\n\n - An unspecified flaw exists that allows an authenticated,\n remote attacker to impact confidentiality and integrity.\n (CVE-2016-1993)\n\n - An unspecified information disclosure vulnerability\n exists that allows an authenticated, remote attacker to\n gain unauthorized access to information. (CVE-2016-1994)\n\n - An unspecified remote code execution vulnerability\n exists that allows an unauthenticated, remote attacker\n to take complete control of the system. (CVE-2016-1995)\n\n - An unspecified flaw exists that allows a local attacker\n to impact confidentiality and integrity. (CVE-2016-1996)\");\n # https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-c05045763\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?d91095a9\");\n script_set_attribute(attribute:\"see_also\", value:\"https://weakdh.org/\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to HP System Management Homepage (SMH) version 7.5.4 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2016/03/15\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/03/15\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/03/24\");\n\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:hp:system_management_homepage\");\n script_set_attribute(attribute:\"plugin_type\", value:\"remote\");\n script_set_attribute(attribute:\"in_the_news\", value:\"true\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Web Servers\");\n\n script_copyright(english:\"This script is Copyright (C) 2016-2018 Tenable Network Security, Inc.\");\n\n script_dependencies(\"compaq_wbem_detect.nasl\", \"os_fingerprint.nasl\");\n script_require_keys(\"www/hp_smh\");\n script_require_ports(\"Services/www\", 2301, 2381);\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"http.inc\");\ninclude(\"webapp_func.inc\");\n\nport = get_http_port(default:2381, embedded:TRUE);\n\ninstall = get_install_from_kb(appname:'hp_smh', port:port, exit_on_fail:TRUE);\ndir = install['dir'];\nversion = install['ver'];\nprod = get_kb_item_or_exit(\"www/\"+port+\"/hp_smh/variant\");\n\nif (version == UNKNOWN_VER) exit(1, 'The version of '+prod+' installed at '+build_url(port:port, qs:dir+\"/\")+' is unknown.');\n\n# Only Linux and Windows are affected -- HP-UX is not mentioned\nif (report_paranoia < 2)\n{\n os = get_kb_item_or_exit(\"Host/OS\");\n if (\"Windows\" >!< os && \"Linux\" >!< os) audit(AUDIT_OS_NOT, \"Windows or Linux\", os);\n}\n\n# nb: 'version' can have non-numeric characters in it so we'll create\n# an alternate form and make sure that's safe for use in 'ver_compare()'.\nversion_alt = ereg_replace(pattern:\"[_-]\", replace:\".\", string:version);\nif (!ereg(pattern:\"^[0-9][0-9.]+$\", string:version_alt)) exit(1, 'The version of '+prod+' installed at '+build_url(port:port, qs:dir+\"/\")+' does not look valid ('+version+').');\n\nfixed_version = '7.5.4';\nif (ver_compare(ver:version_alt, fix:fixed_version, strict:FALSE) == -1)\n{\n source_line = get_kb_item(\"www/\"+port+\"/hp_smh/source\");\n report = '\\n Product : ' + prod;\n if (!isnull(source_line))\n report += '\\n Version source : ' + source_line;\n report +=\n '\\n Installed version : ' + version_alt +\n '\\n Fixed version : ' + fixed_version +\n '\\n';\n security_report_v4(port:port, severity:SECURITY_HOLE, extra:report);\n}\nelse audit(AUDIT_LISTEN_NOT_VULN, prod, port, version);\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}]}